RSS

How-To Geek

Our last edition of WIG for February is filled with news link coverage on topics such as identity fraud is on the rise in the U.S., a security flaw let a hacker access any Facebook profile, the PlayStation 4 will play used games, and more.

Chrome 25 arrives with speech recognitionGoogle has released Chrome 25 to its Stable Channel which brings improvements to extension security, support for the JavaScript Web Speech API and fixes 22 security vulnerabilities.

Firefox 19 brings PDF viewer and 4 critical security fixesThe latest release of Mozilla’s Firefox open source web browser, version 19, brings few new features but does close four critical security holes. The release notes list only the arrival of PDF.js, the PDF viewer written in JavaScript, as a new feature. This, it is hoped, should reduce users’ exposure to malicious PDF documents which exploit third party PDF reader plugins to get access to the underlying operating system.

Opera cuts staff in WebKit-related restructuringThe Norwegian browser maker cut 91 jobs, some through a voluntary severance program, as part of its embrace of the open-source WebKit browser engine also used in Apple Safari and Google Chrome.

First Microsoft Surface with Windows 8 Pro Bug FoundWhile Microsoft is still struggling to cope with the Surface Pro 128 GB shortage, plenty of early buyers complain about what seems to be the first bug spotted on the device. According to a post on the Microsoft support forums, the Surface pen stops working all of a sudden, with an unofficial workaround suggesting a rather painful fix.

Skype for Windows to Receive Major Update in AprilMicrosoft officially released the video messaging option for Skype this past week, but this new feature is only available for iOS, Android and Mac platforms, while the Windows client is expected to get it at a later time.

JavaFX 3D Early Access now availableOracle has announced that the first public build of JavaFX 8 with official support for 3D mesh, 3D camera and 3D lighting is now available. The build is listed as JDK 8 Build b77 and is available to download for Windows, Mac OS X, Linux and Solaris SPARC and x86, but the 3D features are currently only available on Windows; OpenGL versions for the other platforms may follow.

MemTest86 now maintained by PassMark SoftwareThe classic free memory diagnostic tool MemTest86 has been maintained by author Chris Brady since 1994, but this has finally changed, with Australian company PassMark Software taking over the program this month.

Apple HQ also targeted by hackers, will release tool to protect customersApple says a “small number” of computers on its Cupertino campus were attacked by hackers, according to Reuters. The hack appears to exploit the same Java vulnerability that recently compromised computers at Facebook. “There is no evidence that any data left Apple,” the company reportedly said.

Dev site behind Apple, Facebook hacks didn’t know it was booby-trappediPhoneDevSDK—the site apparently responsible for the hacks at Facebook, Apple, and Twitter—says it was not aware it was being used to attack visitors until it read press reports this week. In a news post on Wednesday, site admins said they had no knowledge of the breach and were not contacted by any of the affected companies.

Certified online banking trojan in the wildJean-Ian Boutin, who works for AV firm Eset, has discovered trojans that carry a valid digital signature. This potentially allows online banking spyware to pass superficial tests as harmless. Apparently, the certificate in question was issued by the DigiCert Certificate Authority – to a company that ceased to exist a long time ago.

Lockheed Martin “almost missed” hacker intrusion“We almost missed it” said Steve Adegbite, Lockheed Martin’s director for cybersecurity, of May 2011’s hacker attack. Adegbite was speaking at the recent Kaspersky Security Analyst Summit in San Juan, Puerto Rico and noted that at first the attack looked like a new person in the department.

DDoS Attack on Bank Hid $900,000 CyberheistA Christmas Eve cyberattack against the Web site of a regional California financial institution helped to distract bank officials from an online account takeover against one of its clients, netting thieves more than $900,000.

Point-of-Sale malware attacks – crooks expand their reach, no business too smallYour personally identifiable information (PII) flows into PoS devices, across PoS networks, and is processed by PoS servers, every time you pay for things without using cash. As a result, PoS equipment and the local-area networks to support it are found all over the world, in both developed and developing countries. As a result, PoS systems are a lucrative target for crooks.

Google’s Android Reborn as Network-Hacking KitThe folks at security tools company Pwnie Express have built a tablet that can bash the heck out of corporate networks. Called the Pwn Pad, it’s a full-fledged hacking toolkit built atop Google’s Android operating system.

Lost+Found: iCloud cracking, BKA trojan infectionsToo small for news, but too good to lose, Lost+Found is a compilation of the other stories that have been on The H’s radar this week. McAfee analyses the recent Adobe Reader exploit, hackers wanting to emigrate to China, the future of password policies, ElcomSoft thinks it can get access to iCloud and the arrest of the alleged developer of the BKA trojan hardly seems to have made a dent.

Comodo Internet Security Pro 2013 ReviewMany use Comodo’s free security products. But do they make also good commercial security solutions? Comodo Internet Security Pro 2013 – is it worth buying? Learn this and more, from this thorough review.